Threat actors, just like any other software developer, are always looking for ways to improve their software. In the case of threat actors this is often done to avoid the mitigation that software vendors have put in place to defend against the malware or patch a vulnerability the threat actors …
More on Follina exploits including advice on how to protect your organisation – now executing in File Explorer preview pane… UPDATE 15 June 2022
This post was originally made on 9 June 2022 Update 15 June 2022 Microsoft has included updates in it’s Patch Tuesday bundle to address this issue: Microsoft Patch Tuesday – Follina zero-day fixed – Smart Thinking Solutions Get the updates done as soon as possible. Let’s hope this is really …
Today Internet Explorer 11 is no more…
End of support for Internet Explorer 11 web browser Today 15 June 2022, Microsoft will retire the Internet Explorer (IE) 11 after 27 years of Internet Explorer being included with Windows. There will no longer be security updates for the application, which means when the threat actors find flaws in …
Emotet are back – now stealing credit card data
The Emotet botnet started off as banking trojan then evolved into a spamming and malware delivery system, has now moved onto exfiltrating credit card data: Emotet malware gang shifts to stealing credit cards • The Register If you have your credit card details stored in your Google Chrome browser, the …
Continue reading “Emotet are back – now stealing credit card data”
Lack of knowledge will hamper anyone’s cyber security efforts
This equally applies to individuals, large and small organisations and government departments. The threat actors best friend, is when we all compartmentalise our cyber security issues, dealing with them quietly and behind closed doors – this includes trying to pay the cyber criminals off! This gives them the opportunity to …
Continue reading “Lack of knowledge will hamper anyone’s cyber security efforts”